{"vuid":"VU#800227","idnumber":"800227","name":"OneOrZero AIMS authentication bypass and SQLi vulnerabilities","keywords":["OneOrZero AIMS Authorization Bypass","SQLi"],"overview":"OneOrZero Action & Information Management System (AIMS) is vulnerable to an authentication bypass and SQL injection.","clean_desc":"According to the vendor's website: \"OneOrZero AIMS is a powerful enterprise ready suite that includes a help desk, knowledge base, time manager and reporting system supported by a highly configurable and extensible Action & Information Management System that allows you to 'build your own system' on the fly.\" AIMS is susceptible to an authentication bypass. An attacker can generate a session cookie for $_COOKIE['oozimsrememberme'] and log in as an administrator without providing a password. AIMS is also susceptible to SQL injection. On line 136 of lib\\ooz_access.php the $cookieName variable that originates from an attacker controllable cookie is passed to a SQL statement without any filtering: $sql = \"SELECT * FROM \" . OOZ_SET_TABLE_PREFIX . \"users WHERE user_name = '\" . $cookieName . $userResult = DB::query($sql, DSN, OOZ_SET_SHOW_SQL);","impact":"An unauthenticated remote attacker may be able to bypass authentication or leak database information.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Yuri Goltsev of Positive Technologies for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.oneorzero.com/","http://en.securitylab.ru/lab/PT-2011-20","http://en.securitylab.ru/lab/PT-2011-21"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-08-25T12:14:27Z","publicdate":"2011-10-12T00:00:00Z","datefirstpublished":"2011-10-13T14:45:51Z","dateupdated":"2011-10-13T14:49:06Z","revision":8,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"14","cam_internetinfrastructure":"11","cam_population":"3","cam_impact":"3","cam_easeofexploitation":"4","cam_attackeraccessrequired":"3","cam_scorecurrent":"0.070875","cam_scorecurrentwidelyknown":"0.091125","cam_scorecurrentwidelyknownexploited":"0.103275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.070875,"vulnote":null}